Details

This scheduled workflow executes a search query in Cisco Secure Malware Analytics for new private samples submitted and convinced as malicious. It then creates a Cisco XDR incident if the sample has been seen on your organisation's assets by one of your integrated modules. Optionally, it can send a notification in Cisco Webex. You can choose to create a Cisco XDR incident and receive a notification even if no internal target has been found. However, this setting may generate noise and lead to alert fatigue.

Description

This scheduled workflow executes a search query in Cisco Secure Malware Analytics for new private samples submitted and convinced as malicious. It then creates a new Cisco XDR incident if the sample has been seen on your organization's assets by one of your integrated modules.

Optionally, it can send a notification in Cisco Webex.

Targets

This workflow requires targets provided by the Cisco XDR Integration Modules.
You can proceed to the next install step without specifying a target, but the workflow will be invalid until it is updated with a valid target.

Notes.

You can choose to create a Cisco XDR incident and receive a notification even if no internal target has been found. However, this is not the recommended settings as it may generate noise and lead to alert fatigue.

The workflow is designed to run every X minutes, but you need to add the automation rule yourself. It can also be run manually on-demand

Before running for the first time, Verify/Modify the global variable “Secure Malware Analytics - Last Sample date”. The workflow will start to collect sample submitted after this date.

The workflow includes a custom atomic action : "Get Unique Table Values".

Steps

  • Search in Cisco Secure Malware Analytic for new private samples with score higher than 85 and get Samples ID, submission date, File Names and File SHA256
    • If no new sample since last run : Complete Success
  • If Webex Notification Enable and no Room ID - Get room ID by name
  • For each new sample :
    • Check if SHA256 already in Stat table : Global Variable "Secure Malware Analytics - Sha256 Table"
    • If new sha256 :
      • If input variable "XDR Incident - only if seen on Internal Assets" set to true :
        • Create XDR investigation and search for Assets
        • If Assets Found :
          • Get Sample Report from Cisco SMA
          • Extract and Parse Behavioural Indicators, Mitre Tactics
          • Create Sighting
          • Search for Indicator in Private Intelligence, if exist then get id and create relationship with sighting, if not create indicator and relationship
          • Create XDR Incident
        • If Webex notification Enable and Only on Incident set to True, notify in Webex Room with XDR incident link
        • If Webex notification Enable and Only on Incident set to False, notify in Webex Room (no incident)
      • If input variable "XDR Incident - only if seen on Internal Assets" set to false :
        • Get Sample Report from Cisco SMA
        • Extract and Parse Behavioural Indicators, Mitre Tactics
        • Create Sighting
        • Search for Indicator in Private Intelligence, if exist then get id and create relationship with sighting, if not create indicator and relationship
        • Create XDR Incident
      • If Webex notification Enable, notify in Webex Room with XDR incident link
Required targets

This workflow requires the following targets to be available before it can be run.

Integration targets

  • Secure Malware Analytics
  • Webex
  • Cisco XDR
About
Author
Ivan Berlinson
Version
v1.0
Average rating
5.0 out of 5
Authorship
Community
Contact and support information
External links
Related workflows
Community
This scheduled workflow executes a search query in Cisco Secure Malware Analytics for new private samples submitted and convinced as malicious.
Community
This Cisco XDR workflow automates threat analysis from incoming emails.
Community
When triggered, this workflow will review the Secure Endpoint machines about installed antivirus (AV) applications in Orbital and send a Webex Alert on new non-approved AV app.
Community
When triggered, this workflow will review the Secure Endpoint machines and local admin users in Orbital and send a Webex Alert on new non-approved admin user.
Community
This workflows runs a (scheduled) "Cisco XDR Integration Module Healthcheck" and posts a message to Webex if such a healthcheck fails.
Cisco Managed
This workflow works with an incident automation rule or playbook to create a Webex room when incidents are created in Cisco XDR.
Cisco Managed
This workflow works with an incident automation rule to send Webex messages when a new incident is created in Cisco XDR.